You are on page 1of 5

International Journal of Engineering Trends and Technology (IJETT) – Volume-42 Number-5 - December 2016

MikroTik Bandwidth Management to Gain the


Users Prosperity Prevalent
Muhammad Donni Lesmana Siahaan1, Melva Sari Panjaitan2, Andysah Putera Utama Siahaan3

Faculty of Computer Science, Universitas Pembangunan Panca Budi


Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia

Abstract – MikroTik operating system is designed as a overcome the above problems, it needs to build a
network router. It is the operating system and system to manage traffic on the Internet network.
software that can be used to make a computer into a
reliable network router. The computer includes a II. THEORIES
variety of features for IP networks and wireless
networks. These functions include Firewall & Nat, A. A Brief History
Bandwidth Limiter, Routing, Hotspot, Point to Point
Tunneling Protocol, DNS server, DHCP server, MikroTik made by MikroTikls, a company in the
Hotspot, and many other features. On a network that city of Riga, Latvia. Latvia is a country that is a
has many clients, it requires a bandwidth adjustment "fraction" of the former Soviet Union or Russia today.
mechanism to prevent the bandwidth over the limit. All Its establishment was initiated by John Trully dan
clients get their bandwidth fairly. Bandwidth Arnis Riekstins. John Trully is an American citizen
Management is the method used to meet those needs. who immigrated to Latvia. In Latvia, he met with
Limiting bandwidth on MikroTik Hotspot is necessary Arnis, a scholar of Physics and Mechanics around
to perform. Wireless hotspot can be accessed 1995. John and Arnis began routing the world in 1996.
anywhere to whom it may have the access policy. The mission of MikroTik is routing all over the world.
Bandwidth Limitation is required to promote justice MikroTik originally intended for Internet Service
and prosperity prevalent in all the hotspot user. Provider (ISP) serving customers using wireless
technology. Currently, MikroTikls provides services
Keywords – Bandwidth, Network, MikroTik to many wireless ISPs for Internet access services in
many countries in the world and is also very popular.
I. INTRODUCTION MikroTik provides hardware and software devices for
Internet connectivity in most countries around the
The internet access today is the imperative aspect. world.
It is necessary to either search information or play
online games. Distribution of bandwidth is a very MikroTik started with Linux and MS-DOS
important thing to do by an internet service provider technology combined with Wireless LAN AERONET
[1][2]. This can be done using a computer or device speed of 2 Mbps in Moldova [3]. Then he serves five
that can limit the speed of the internet. MikroTik customers in Latvia. Their basic principle is not to
Router is one of both hardware and software vendors make the Wireless ISP, but it makes the program a
that provide facilities to perform bandwidth router that is reliable and can run around the world.
management. It also provides the operating system Latvia is only an experiment where John and Arnis
that is specifically used to create a router [6][7]. It is because now they have the help of other countries
done by installing it into the computer. The tools including Sri Lanka which serves approximately 400
provided in MikroTik Router is well-equipped to build users.
a stable and reliable router.
Linux was first used is Kernel 2.2 which was
Internet Service Providers realize that a bandwidth developed jointly with the assistance of the staff of 5-
is the most important part of a network. Bandwidth 15 people Research and Development (R & D) that
limiter is indispensable for the creation of a fast and now dominate the world MikroTik routing in
flexible access that the Internet connection is stable developing countries. According to Arnis, besides the
according to the needs in each part of the need for staff MikroTik environment, they also recruit
bandwidth management to divide the amount of freelance and third parties to develop an intensive
bandwidth is needed. Bandwidth management is very marathon MikroTik.
easy, and efficiently used by any internet service
provider for using the bandwidth of each user will B. MikroTik
gain speed with the same grade or size without
disturbing the speed to another user [4][5]. To MikroTik uses Linux as its operating system. It is
used as a network router. It is created to provide

ISSN: 2231-5381 http://www.ijettjournal.org Page 218


International Journal of Engineering Trends and Technology (IJETT) – Volume-42 Number-5 - December 2016

convenience and freedom to its users. The anymore since all the functions on the router already
administration settings can be done using the inside. When compared with a PC that is installed
Windows Application; it is called "WinBox". The RouterOS, router board size is smaller, more compact
computers that will be used as a MikroTik router also and power-efficient as simply using an adapter. For
does not require a high specification [3][5]. For use in the Wi-Fi, network can be installed on the tower
example, it is only as a gateway. Unless it is used for and use PoE as a current source.
complex networks, it should use adequate
specifications. MikroTik features include Firewall &
Nat, Hotspot, Routing, Bandwidth Limiter, DNS
server, Point to Point Tunneling Protocol, Hotspot,
DHCP server, and many more.

MikroTik is a computer operating system and


computer software that is used to make the ordinary
computer into a router. MikroTik divided into two,
MikroTik RouterOS and RouterBoard. MikroTik
RouterBoard does not require a computer to run it; it
is sufficient to use a board that already include the
MikroTik RouterOS. It includes features which
particularly made for IP networks and wireless
networks. Fig. 2 MikroTik RouterBoard

MikroTik featured hardware products are Routers, III. RESULT AND DISCUSSION
Switches, Antennas, and other supporting devices
while the flagship software product is MikroTik A. Topology
RouterOS as shown in Figure 1. MikroTik RouterOS
is the operating system that can be used to modify the MikroTik must be placed once after the ADSL or
computer system into a reliable network router, Internet Modem. Every device which is put before the
includes various features which made for IP networks router board will be skipped and cannot be managed
and wireless networks, suitable for use by ISPs and by the router board. The router board controls
hotspot providers. The installation is not required everything below it. Figure 3 shows the router board
additional software or other additional tools. It is position. The router board now controls the PC Clients
created for administrative management such as through the Switch or the connection from the Access
computer network design and build a small-scale Point speed.
computer network systems to complex ones.

Fig. 1 MikroTik RouterOS


Fig. 3 MikroTik Topology
Figure 2 shows the MikroTik RouterBoard. It is the B. Configuration
embedded router products from MikroTik.
Routerboard as an integrated mini PC because it has Before doing the configuration, there are several
processors, RAM, ROM, and flash memory. It uses things must be prepared. There are:
RouterOS that serves as a network router, bandwidth
management, proxy server, DHCP, DNS server and  WinBox
hotspot server. There is several series router board  Public IP : 192.168.26.7
which can also function as Wi-Fi as a Wi-Fi access  Gateway : 192.168.26.254
point, bridge, or as Wi-Fi WDS client (RB411,  DNS server : 10.11.12.1
RB433, RB600). Most ISPs use the Wireless LAN  MikroTik RouterBoard standard IP is:
function to run either as an Access Point or Client. It 192.168.88.1
can be executed without depending on the PC  Login Name : admin

ISSN: 2231-5381 http://www.ijettjournal.org Page 219


International Journal of Engineering Trends and Technology (IJETT) – Volume-42 Number-5 - December 2016

 Login Password : (leave blank)

The first thing to do is to set up the IP Address on


the PC. IP Address used is 10.10.20.8. This IP follow
each rule that has been set on the MikroTik router.

Fig. 5 MikroTik Interface (Internet)

Fig. 4 IPv4 Address configuration

Figure 4 describes the IP configurasion. The IP


address can be set in class A, B, or C. The first thing
to do is to ping the MikroTik router by typing the
command in terminal prompt. Once the PC and the
router have been connected, open the WinBox
application, select the name of the IP router address
that wants to be set and select connect.
After connect, on the start screen of the program is
on the toolbar "interfaces" there will be some of the
ethernet port. This study uses five ports of ethernet.
Two of these ports will be renamed, "Internet" and
"LAN." To rename a port, click twice on the ethernet Fig. 6 MikroTik Interface (LAN)
that wants to be changed and replace the name with
the desired name (Internet and LAN). This following Figure 5 and 6 show how to set the new name for
figure shows the how to change the port name. the interface. Each ethernet has a unique MAC
Address. The receive and transmit bandwidth are also
can be determined for limited values.

The next step is to configure NAT Rule. Network


Address Translation, or more commonly referred to as
NAT is a method to connect more than one computer
to the Internet using a single IP address. The amount
of use of this method due to the limited availability of
IP addresses, the need for security, and ease and
flexibility in network administration.

Currently, the IP protocol is widely used IP version


4 (IPv4). With a length of 4 bytes address means that

ISSN: 2231-5381 http://www.ijettjournal.org Page 220


International Journal of Engineering Trends and Technology (IJETT) – Volume-42 Number-5 - December 2016

there are 2 to the power 32 = 4,294,967,296 IP


addresses available. This amount is theoretically the Name : PC2
number of computers that can directly connect to the Target Address : 10.10.20.6
internet. Because of this limitation, most of the 10.10.20.7
Internet Service Providers will only allocate one 10.10.20.8
address for a single user, and this address is dynamic. 10.10.20.9
A given IP address will be different every time the 10.10.20.10
user connects to the Internet. On the one hand, the Target Upload : 128 kbps
user needs many computers connected to the Internet, Target Download : 128 kbps
but on the other side, only a single IP address can be
connected to the internet. This can be overcome by
using NAT. With NAT gateways that run on one
computer, an IP address can be shared by several
computers to another and they can connect to the
Internet simultaneously.
For example, if the users want to hide the local
network / LAN 192.168.0.0/24 behind one IP address
202.51.192.42 provided by the ISP, which we use is a
feature of Mikrotik source network address translation
(masquerading). Masquerading will change the data
packets source IP address and port of the network
192.168.0.0/24 to 202.51.192.42 to subsequently
forwarded to the global Internet network.

C. Bandwidth Limiter
Fig. 8 MikroTik Simple Queue (PC2)
After NAT Rule configuration is completed, the
next step is to distribute bandwidth to each user. This Figure 7 and 8 show the bandwidth configuration.
can be done by going to the menu queues. On the The purpose of the trial is the bandwidth 10.10.20.2 IP
toolbar click queues then add or add it by clicking the Address - 10.10.20.5 will gain bandwidth of 384 kbps,
plus sign (+) on the toolbar. In Simple Queue the whereas the PC2 with the IP Address 10.10.20.6 -
General section fill as below: 10.10.20.10 will gain bandwidth of 128 kbps of total
bandwidth capacity. The following figure describes
Name : PC1 the distribution of bandwidth capacity.
Target Address : 10.10.20.2
10.10.20.3
10.10.20.4
10.10.20.5
Target Upload : 384 kbps
Target Download : 384 kbps

Fig. 9 Queue List

After configuring the bandwidth, browse to some


websites is one way to test whether the bandwidth
limitation is successful or not. To see the activities of
each user can be done by using the Torch tool menu as
shown in Figure 10; it serves for monitoring traffic in
certain networks in real-time. If at the time browsing
the queue red means the bandwidth is already full,
while if yellow means the bandwidth uses half of the
quota has been granted, and for green means the
Fig. 7 MikroTik Simple Queue (PC1) bandwidth is free or idle.

ISSN: 2231-5381 http://www.ijettjournal.org Page 221


International Journal of Engineering Trends and Technology (IJETT) – Volume-42 Number-5 - December 2016

Detection System in Network Forensic Analysis


and Investigation,” IOSR Journal of Computer
Engineering, vol. 18, no. 6, pp. 115-121, 2016.
[5] P. Mollick, S. Biswas, A. Halder & M. Salmani,
“Mikrotik Router Configuration using IPv6,”
International Journal of Innovative Research in
Computer, vol. 4, no. 2, pp. 2001-2007, 2016.
[6] N. Chahardah & C. Ghorbani, “Review:
Advantages and Disadvantages of MikroTik
Nstreme Protocols on Wireless Networks,”
International Journal of Computer Networks and
Communications Security, vol. 3, no. 6, pp. 244-
247, 2015.
[7] I. V. E., O. C. C., N. S. U. & O. C., “Performance
Evaluation of IEEE 802.11 Distributed
Coordination Function (DCF) in a Multi-Rate
WLAN,” International Journal of Engineering
and Innovative Technology, vol. 1, no. 5, pp. 207-
Fig. 10 Torch Menu
209, 2012.
IV. CONCLUSION

It can be concluded that the use MikroTik in


managing network traffic gains the user prosperity
prevalent. Each user can use quotas effectively and
efficiently. Hardware requirements are required for
installation Mikrotik program is not too high when
compared with providing one computer for managing
the network. Mikrotik manage bandwidth use can
increase the functional distribution of bandwidth to the
clients in order to be more equitable distribution of
bandwidth. All computers can use the internet with a
smooth and stable despite all computers using the
internet at the same time. All the parts of the computer
unit gain bandwidth according to needs that have been
determined. The Administrator shall have the easier
job in controlling the bandwidth of not using
MikroTik.

REFERENCES

[1] A. Lubis & A. P. U. Siahaan, “WLAN Penetration


Examination of The University of Pembangunan
Panca Budi,” International Journal of Engineering
Trends and Technology, vol. 37, no. 3, pp. 165 - 168,
2016.
[2] M. T., B. B., B. T. M., R. Rajaram & B. V. K.,
“Network Forensic Investigation of HTTPS
Protocol,” International Journal of Modern
Engineering Research, vol. 3, no. 5, pp. 3096-
3106, 2013.
[3] A. M. Saliu, M. I. Kolo & M. K. Muhammad,
“Internet Authentication and Billing (Hot Spot)
System Using MikroTik Router Operating
System,” International Journal of Wireless
Communications and Mobile Computing, vol. 1,
no. 1, pp. 51-57, 2013.
[4] Hariyanto & A. P. U. Siahaan, “Intrusion

ISSN: 2231-5381 http://www.ijettjournal.org Page 222

You might also like